A cryptocurrency exchange hack with a North Korean accent
The attack methods serious cybercriminals use are often so sophisticated that even…
How risky is the Internet? Researchers say 42%
When you visit a website, you can open your computer to a…
Data-thieving Chrome extension
Owners of software stores (Google, Apple, Amazon, et al.) have to fight…
A good reason to avoid cheap Android smartphones
Having decided to buy an Android smartphone, one faces a crazy variety…
Mobile beasts and where to find them — part one
In recent years, cybercriminals have been increasingly fixated on our phones. After…
Why conventional malware threatens industrial environments
There have been some stories about the kind of network air-gapping ordinary…
How to avoid turning your smartphone into a spyware zoo
Sometimes even a completely innocent-looking site with a good reputation can be…
Roaming Mantis infects smartphones through Wi-Fi routers
Some time ago our experts investigated a piece of malware that they…
What happened to the Internet: attack on Cisco switches
Let’s say that your internet connection suddenly went down or, perhaps, you…
SynAck ransomware: The doppelgängster
Malware tends to evolve, with crooks adding new functions and techniques to…